Student Support

Student Support

From the outset, it was clear to the Foundation that the provision of a bursary award alone, although capable of making a significant financial impact on a student's circumstances, was not sufficient in itself to ensure that a student coping with multiple challenges could complete his or her degree course in higher education successfully.

For many students, receiving a bursary award is like being thrown a life line - and they also need on-going and regular personal advice and support to guide them safely to the shore.

Having made personal contact with the Foundation at the time of receiving their award, the Foundation maintains regular contact with students by email, text and phone throughout the duration of their studies and beyond.

Types of support given by the Foundation include:

maintaining regular contact with students, being a 'shoulder to cry on' and celebrating students' achievements

working with students to enable them to find solutions to financial problems

signposting students to expert organisations for support in overcoming specific difficulties

acting as a personal referee to students entering university and liaising on behalf of students with colleges, universities and external agencies

providing students with the opportunity to make contact with other award winners studying in the same university or town and with the network of HKF award winners nationally

providing students with opportunities for training, work shadowing and voluntary work to develop transferable skills necessary in employment

Contact Us

Address

Email

Phone

Privacy Policy

We understand the power that the Internet holds for changing your life and making things easier for you. These benefits are at risk if people are concerned about their personal privacy.
We are committed to providing you with an Internet experience that respects and protects your personal privacy, choices and concerns. Our privacy policy and practices are detailed below. Please read them thoroughly.

Helpful definitions

Personally identifiable information is information, such as your name, birth date, e-mail address or mailing address, which can be used to uniquely identify you.

Anonymous information is not personally identifiable information. Anonymous information is information about how you use our site. Anonymous information also includes the domain names and/or I.P. addresses (as explained below) of Internet browsers that visit our site, the time of day that the site was visited, and other non-personal information.

Anonymous information is information that is not tied to any person, but helps us know what our users do (for example, we know that the average stay lasts over five minutes).

Collecting and using personally identifiable information

You can visit our site and use many of our services without telling us who you are or revealing any personal information about yourself to us. It is only when you enter details to contact us that will you be asked to provide us with personally identifiable information.

When you fill in these forms, you need to complete certain fields (some are required and some are optional). We use this information to share your information with select third parties who work with us, only if you give us permission (as we explain below).

Sharing Personally Identifiable Information with Other Companies

We will not share your personally identifiable information unless you have authorized us to share it. When we share your personal information with other companies, they can use this information but cannot combine this information with other information they have about you or share this information with other companies or people without your express permission.

Disclosure of your Identity

From time to time we receive requests to disclose the identities of our users.

We do not disclose the identities of our users unless we are legally required to do so. If a governmental agency, or a law enforcement agency, requests information in relation to the identities of our user, we will comply with the request.

If we receive a request by a third party that is not a governmental agency (for example, a request in connection with civil litigation), we will contact the user whose identity has been requested using the contact information the user provided during the registration process.

We will wait 10 days after notifying the user before deciding whether to comply with the request by disclosing the identity of the user, unless the request requires us to disclose this information before then. If we cannot wait 10 days because of the deadline in the request, we will let the user know the deadline included in the request when we provide notice that we received it.

Anonymous Information

We collect anonymous information when people use our site, even if they have not entered their personal details.

We will not share any anonymous information about your use of our site with third parties if we know that this information will be linked with your personally identifiable information obtained from another source, unless you have given us permission to do this.

Cookies

A cookie is a small piece of data that is sent to your browser from a web server and stored on your computers hard drive. Cookies do not damage your computer. Cookies make web surfing easier for you by saving your preferences while you are on our site.

You can decide if you want to accept cookies by changing the settings on your computer. You can reset your browser to refuse all cookies, or allow your browser to show you when a cookie is being sent.

Use of I.P. Addresses

An Internet protocol (I.P.) address is a set of numbers that is automatically assigned to your computer whenever you log on to your Internet service provider or through your company's local area network (LAN) or wide area network (WAN). Web servers, the powerful computers that provide web pages for viewing, automatically identify your computer by the I.P. address assigned to it during your session online. We may collect I.P. addresses for some purposes.
Security

We operate secure data networks protected by industry-standard firewall and password protection. We have security measures in place to attempt to protect against the loss, misuse and alteration of your user data under our control.

Only certain employees have access to the information you provide us. While we cannot guarantee that loss, misuse or alteration to data will not occur, we try to prevent such unfortunate occurrences.